Try Premium for 30 days

Live games for all NFL, MLB, NBA, & NHL teams
Commercial-Free Music
No Display Ads
Security Intelligence Podcast-logo

Security Intelligence Podcast

158 Favorites

More Information


United States




[Encore] The Hunter Becomes The Hunted — The Value Of Red On Blue Cyber Training

A good policeman is able to understand how the criminal carried out the crime. Shouldn't the same be true for security professionals? In this podcast — originally broadcast in August — John Clarke, Jason Flood, Maria Hyland and Trevor McWeeney, all of IBM Ireland, have a spirited conversation about the many benefits of red on blue cyber training. Listen now, and read the accompanying blog [], to learn all about red on blue cyber training, including whether the blue team needs...

Duration: 00:10:05

DCH 07: When You Hear the Vultures, It's Too Late: Preparing Your Security Strategy Now

Episode 7 of the monthly "Deciphering the Cyber Headlines with Paul Ferrillo and Chris Veltsos" series. October 2017 was a scary month for cybersecurity — and Halloween was the least of it. In light of recent attacks like Bad Rabbit, Paul and Chris chose the theme of "changing the game" for this month's podcast. Listen now to learn how businesses like yours can change the dynamic to one where cybersecurity is a business priority rather than an IT afterthought. RESOURCES: Read Chris' blog...

Duration: 00:19:40

Peeling Back the Onion on Threat Hunting

Have questions about what threat hunting is or how and when to use it? Then this is the podcast you've been waiting for. Listen in for great threat hunting insights from Bob Stasio, program director of cyber threat hunting and analysis at IBM Security and special guest Dr. Eric Cole, founder of Secure Anchor Consulting. To learn even more, read Eric's recent Security Intelligence blog series [] and follow Bob [] and Eric [] on...

Duration: 00:17:46

The World At Risk: Talking E&U Security with the X-Force Research Experts

In this very timely podcast, Nick Bradley and Michelle Alavarez, both of the X-Force Threat Research team, examine what makes the energy and utility (E&U) industry such an attractive target for attackers. Listen now as they discuss the most notable areas of risk for the E&U sector, why attacks on industrial control systems (ICS) have surged over the past 18 months and where E&U companies should focus their investments and resources when it comes to cybersecurity. To learn more, read the...

Duration: 00:12:48

Calling Both Students and Working Professionals! Consider A Career In Cybersecurity

The shortage of trained cybersecurity professionals, also referred to as the cybersecurity skills gap, is a known problem that is only expected to intensify in the years ahead. In addition to posing a risk to the global economy, the skills gap is also a legitimate security threat. In this podcast, David Jarvis, security and chief information officer (CIO) lead at the IBM Institute for Business Value, talks with Heather Ricciuto, academic outreach leader at IBM Security, and Chris Veltsos,...

Duration: 00:20:49

The Mobility Breakup Hour: From Your Ex To Your Next

Security Intelligence is pleased to sponsor this episode of the Mobility Breakup Hour. Listen in as host Rob Patey advises callers on their mobile security woes, ranging from relationships that are no longer fulfilling to those that have devolved into sordid love triangles involving multiple tools and solutions that refuse to communicate with one another. If you're looking for an MDM solution you can call "the one," this is the podcast for you. Listen now, then download the 2017 Gartner...

Duration: 00:20:45

Quick Take: Vijay Dheap Highlights the Benefits of Cognitive Technology

This Quick Take podcast features Vijay Dheap, Program Director for Cognitive, Cloud, Analytics at IBM Security. Listen now to learn how cognitive security technologies can solve gaps in information, speed and accuracy. You'll also discover what businesses can expect to achieve when adopting cognitive solutions. To learn more, read Vijay's blog, "IBM QRadar Advisor with Watson: Revolutionizing the Way Security Analysts Work" [], visit the QRadar Advisor with Watson homepage...

Duration: 00:04:52

Cybersecurity Isn't Rocket Science: NCSAM Insights From X-Force Red

October is National Cyber Security Awareness Month (NCSAM) as well as Halloween season. In honor of this this confluence of events, Space Rogue and Videoman, both of IBM X-Force Red, have come together for a conversation about some scary security blunders and, because we don't want our listeners to have nightmares, some tips for resurrecting your security strategy. To learn more about X-Force Red or to schedule a demo, visit: Or listen to another podcast on National Cyber...

Duration: 00:09:35

Quick Take: Bob Stasio Talks Cognitive Security And Threat Hunting

Have 5 minutes? That’s plenty of time for this episode of Quick Time! Listen now to hear Bob Stasio, Program Director of Cyber Threat Hunting and Analysis at IBM Security, discuss the cognitive security glide path and share his thoughts on the future of cyber threat hunting. To learn more, read Bob’s recent blog on the cognitive security glide path:

Duration: 00:03:34

DCH 06 We're All In This Together: National Cyber Security Awareness Month

Episode 6 of the monthly "Deciphering the Cyber Headlines with Paul Ferrillo and Chris Veltsos" series. October is National Cyber Security Awareness Month (NCSAM), and this podcast kicks off 4 weeks of Security Intelligence content [] dedicated to the role we all play in making the internet safer. Listen now to hear a spirited discussion on the various themes of this year's NCSAM campaign, including "Cybersecurity in the Workplace is Everyone’s Business" and...

Duration: 00:22:05

IBM and Senetas: Providing Secure Data Storage In An Insecure World

In this podcast, Julian Fay, CTO of Senetas, joins Deepraj Emmanuel Datt, Solution Design Leader at IBM Security Services Asia-Pacific, for a conversation about data protection and secure data storage. Listen now to discover the unique capabilities of Senetas' enterprise-grade SureDrop file-sharing platform [], including full encryption, data sovereignty and key management control. You'll also hear about how IBM and Senetas are working together to promote secure data...

Duration: 00:13:28

[Encore] The 5 Indisputable Facts of IoT Security

For the first time, listen to the complete "5 Indisputable Facts of IoT Security" podcast series from earlier this year as a single hour-long podcast. Fact 1. Devices will operate in hostile environments; Fact 2. Software security will degrade over time; Fact 3. Shared secrets do not remain secret; Fact 4. Weak configurations will persist; Fact 5. As data accumulates, exposure issues will increase. Listen now for the complete insights from our featured panel of IBMers: James Murphy,...

Duration: 01:02:25

[Encore] The Biggest Security Risks In Health Care IT Systems

Should health care organizations be mandated to have more sophisticated security programs than other industries? Does HIPAA compliance have any security merit? In this podcast Shahid Shah, CEO of Netspective, discusses these and other thought-provoking questions about the state of U.S. health care security with David Chou, Chief Information and Digital Officer at Children's Mercy Hospital in Kansas City, Missouri. To learn more about health care security, visit

Duration: 00:29:05

Better Than Mr. Robot: Penetration Testing with X-Force Red

In this episode of our ongoing series featuring members of the IBM X-Force Red team, North American Regional Lead Steve Ocepek offers a glimpse into the world of elite penetration testing. While he can't reveal all the tricks of the trade, Steve does discuss how the X-Force Red brand has grown and evolved over the past year, what makes an ideal candidate to join the team and why X-Force Red takes a collaborative, team-oriented approach to pen testing. To learn more about X-Force Red or to...

Duration: 00:11:48

DCH 05 Understanding The Media Hacks Of 2017

Episode 5 of the monthly "Deciphering the Cyber Headlines" series. Summer is meant to be a time for blockbuster movies and TV spectaculars, but were hackers the big winner of the 2017 season? In this podcast, Paul and Chris discuss the media hacks of the past few months, emphasizing the role played by third-party vendors. To learn more about how identity and access management solutions can help protect your sensitive data, read the IBM white paper: And for more...

Duration: 00:16:09

'Cracken' Passwords with EvilMog of IBM X-Force Red

In this podcast, Dustin Heywood, aka EvilMog, of IBM X-Force Red talks about the latest trends in password hacking. He also discusses his experience creating the Cracken, a powerful password-cracking rig that debuted at Black Hat 2017 and will be used to help organizations discover and defend against cyberattacks. To learn more about X-Force Red or to schedule a demo, visit: You can also stay up to date by following EvilMog [] and Dillon Townsel...

Duration: 00:08:32

A CISO’s Guide To Obtaining Budget: Exploit Pet Projects [6/6]

This is episode 6 of the "CISO’s Guide to Obtaining Budget" podcast series. To hear the entire series, visit In this concluding episode of this series, guest speaker John Dickson, principal and co-founder at Denim Group, focuses on how CISOs can add security components to CAPEX projects, effectively positioning themselves “upstream” of security needs. Understanding where and when to insert security initiatives into larger projects is a common denominator of success for many...

Duration: 00:16:25

CISO’s Guide To Obtaining Budget: Never Waste A Good Crisis (or Data Breach)[5/6]

This is episode 5 of the "CISO’s Guide to Obtaining Budget" podcast series. Unlike most resource allocation decisions within the enterprise, decisions involving security projects are often influenced by external events, namely data breaches encountered by other organizations in one's own sector or industry. Today, guest speaker John Dickson, principal and co-founder at Denim Group, looks at how CISOs can take advantage of external breach stories to demonstrate the tangible need for...

Duration: 00:16:55

A CISO’s Guide To Obtaining Budget: Consciously Cultivating Credibility [4/6]

This is episode 4 of the "CISO’s Guide to Obtaining Budget" podcast series. Today, guest speaker John Dickson, principal and co-founder at Denim Group, explains why CISOs must be deliberate in their efforts to cultivate credibility. Those who approach the executive team only to ask for money or when a crisis is underway are less likely to have their requests met. To discover what’s impacting today’s CISO, visit the IBM website [] and the CISO Corner [] on...

Duration: 00:13:08

A CISO’s Guide To Obtaining Budget: Know Yourself [3/6]

This is episode 3 of the "CISO’s Guide to Obtaining Budget" podcast series. Today, guest speaker John Dickson, principal and co-founder at Denim Group, highlights the value of knowing oneself and one's organization before appealing for funds and resources. Understanding how security fits into the larger corporate culture is crucial, as is cataloging all assets and liabilities that will influence conversations with the executive team. To discover what’s impacting today’s CISO, visit the IBM...

Duration: 00:13:34

See More